Forensic Computing. Digital Evidence for Case Preparations
|
|
- Ruth Cecily McCormick
- 5 years ago
- Views:
Transcription
1 Forensic Computing Digital Evidence for Case Preparations In 1965 Gordon Moore wrote in Electronics Magazine 1 his theory on the potential for computational evolution increasing at a factored rate of double per year. Whilst his law has since been tempered based on actual industry development life-cycles, his prophetic statement still holds largely true and today there is almost no walk of life or industry where computers and information networks have not become deeply integrated and criminals have moved in step with technical advances, discovering ways in which to leverage IT to facilitate the commissioning of offences. In many instances this is old, or conventional crime, perpetrated using new approaches that are reliant on technology. Postal fraud, for instance, has evolved to employ electronic communication channels, giving rise to waves of s seeking to defraud recipients with promises of money and fictitious prizes (commonly known as 419 scams as many of such notes tend to originate from the African continent and 419 is their penal code for wire fraud). Studies into the cost of cyber-crime, commissioned independently by the Department of Trade and Industry (DTI) 2, reveal alarming trends in the abuse and misuse of technology. The average cost per security incident has risen to over 160,000 and nearly one in four businesses in the UK have suffered a serious hacker attack or virus outbreak. The impact of an information security breach can be so devastating to business operations that one in ten never actually recover and the shutters close permanently. To counter this growing threat, security and law enforcement agencies have adopted fresh approaches for dealing with high technology crime. Forensic Computing is a relatively young science when compared to contact forensics such as fingerprint recognition which have roots that can be traced back to Edmond Locard 3, who in the early 1900s famously postulated the theory of evidence being left as mutual exchanges of contact. Whilst various descriptions exist in relation to this practice, the international survey undertaken by Hannen et al., has been taken as the de-facto definition: Processes or procedures involving monitoring, collection, analysis as part of a priori or postmortem investigations of 1 Cramming more components onto Integrated Circuits, Electronics Magazine, 19 April DTI Information Security Breaches Survey 2006: see 3 Dr Edmond Locard, Father of Modern Ridgeology: see The Barrister Magazine AFENTIS Information Assurance Page 1 of 5
2 computer misuse. It is important to appreciate that this definition takes a wider view than the conventional reactive description, where forensics was regarded purely as an incident response function. Hannen et al. consider digital forensics as also taking a pro-active role in security, where it can be combined with intelligence and operational planning. As a serious field of research, forensic computing studies only started to take real form in the early 1990s when, faced with ever increasing numbers of computers being seized at crime scenes and the potential for crucial evidence to be stored on a PC, various government agencies came together to host the International Conference on Computer Evidence (ICCE). Here many of the challenges facing law enforcement communities were aired and agreements forged to cooperate towards finding effective solutions. Two years later, in 1995, the International Organisation for Computer Evidence (IOCE) 4 was formed, and a further two years later the member states that comprise the G8 subscribed to the mission of IOCE, pledging support for the organisation. This was the catalyst required to stimulate research and development, and since then great advances have been made in all spheres of digital evidence management. When working on a matter where the case will rise or fall on the strength of digital evidence, for example where an allegation of possession of indecent images has been made, it is important to commission an independent forensic examination of all evidence and digital materials. This places the evidence into the wider context of the offence and enables barristers to make directions to the court based on a fuller appreciation of matter. Assuming material has been seized by the authorities, the state will usually conduct their own forensic assessments (typically undertaken by the regional police hi-tech crime unit 5 ), the results of which will be provided to legal representations. The mechanics of this process involve the imaging of the target media the process of making a forensically sound duplication of digital materials of interest (e.g. the computer hard drive). During this duplication process a write-blocking device will be employed to ensure the target media is not affected or corrupted in any capacity whilst its content is read and mirrored. The actual forensic analysis is then made upon the duplicated material, with the original placed into secure storage and maintained in the state in which it was seized. The forensic analyst will then peruse the imaged copy to identify materials of potential 4 International Organisation on Computer Evidence (IOCE): see 5 National Hi-Tech Crime Unit (NHTCU): see The Barrister Magazine AFENTIS Information Assurance Page 2 of 5
3 evidence value, extracting copies as necessary to form the basis of the expert report. Looking at this from a defence perspective, a number of questions should be posed in relation to the digital evidence (based on the Daubert threshold test that evaluates the competency of evidence): whether the theories and techniques employed by the scientific expert have been tested; whether they have been subjected to peer review and publication; whether the techniques employed by the expert have a known error rate; whether they are subject to standards governing their application; and whether the theories and techniques employed by the expert enjoy widespread acceptance. Sam Patel, Head of Incident Response at AFENTIS, speaking at a recent legal seminar at the Liverpool Anglican Cathedral said: As the threat landscape has changed, so too have the countermeasures with specialists developing tools to aid in the recovery of sensitive data and to successfully isolate it so as to ensure it can be made admissible in a court of law. Putting abuses of technology on a statutory footing, Britain has a suite of legislation that can be invoked, from the Computer Misuse Act to the Regulation of Investigatory Powers Act Today digital forensics is an accepted science, and evidence duly secured in relation to best practices (in the UK these guidelines are outlined by the Association of Chief Police Officers) can be served in a court of law. Digital forensics are providing breakthroughs in all manner of high profile cases around the world, helping security and law enforcement agencies to catch offenders and secure convictions. In the US, for example, the notorious BTK serial killer that had a reign of terror lasting over twenty five years in the Wichita areas, was ultimately tracked down after he sent a disk to a local radio station gloating at the police s inability to catch him. Unique digital footprints embedded within the files were extracted by forensic specialists, and like a lone fingerprint, investigators now had a powerful lead all they needed was to match the file to the computer that had created it (much like having a 6 Computer Misuse Act 1990: see 7 Regulation of Investigatory Power Act 2000: see The Barrister Magazine AFENTIS Information Assurance Page 3 of 5
4 fingerprint but not a suspect s hand to match it with). Wichita Police then conducted a house to house search, taking file samples from every computer encountered. Back in the laboratory, the file footprints were compared to the sample disk posted by the BTK killer, eventually finding a match. This tied the floppy disk to Dennis Radar s PC, a virtual smoking gun as far the prosecution were concerned. This digital evidence became a pivotal element of the State s case and ultimately helped secure a conviction. In the UK the 2002 murders of Holly Wells and Jessica Chapman in Soham, Cambridgeshire, also saw digital forensics play a crucial, but largely unknown, role in the investigation. Technical analysts examined one of the girl s mobile phone to identify where it was located when it had been turned off. Information on the nearest network communication tower tends to be stored in a phone s memory and when the signal coverage of that tower is plotted, it is possible to identify the rough area (typically a few square kilometres) in which the phone was located when it was switched off. Having extracted this information from the handset, authorities had a rough idea of where to base their search; which ultimately led to the recovery of the two girl s bodies. Speaking in an interview several years after his pioneering research on the Manhattan Project 8 where atomic reaction theory was developed, scientific visionary Oppenheimer explained that the scientist is free to ask any question, to doubt any assertion, to seek for any evidence. This thinking holds especially true when applied to the discipline of forensic computing in a legal context. Here experts may be instructed by either the prosecution or the defence, however, in either instance, they have a higher duty to the court. They are instructed as experts, but experts for the truth. It is important therefore to ensure that the experts instructed are duly qualified, experienced and independent. Commenting on the nature of digital evidence, John Brown, Partner at Hogan Brown Solicitors, explained how the fragile nature of digital evidence can pose serious challenges to the investigator: digital material is extremely volatile perhaps more delicate than its physical counterparts. It can be copied, amended, and transferred without almost any trace only experienced and qualified specialists should be employed to work in a digital forensic environment if the subsequent findings are to withstand the scrutiny of a court of law. When working on a matter where the case will rise or fall on the strength of the digital evidence, perhaps where an allegation of possession of indecent images 8 Manhattan Project: see The Barrister Magazine AFENTIS Information Assurance Page 4 of 5
5 has been made, it is important to commission an independent forensic examination of all evidence and digital materials. Forensic computing and the securing of digital evidence is a powerful tool in today s fight against increasingly technically-savvy criminals. It is a discipline that continues to evolve and should remain high on the radar for both legal practitioners and law enforcement authorities. AFENTIS - Expert analysis of mobile telephones, computer systems and all aspects of digital evidence. AFENTIS runs frequent briefings across the UK on the changing face of technology and IT-related legislation. To find out more visit: or contact Diana Allan on or via diana.allan@afentis.com The Barrister Magazine AFENTIS Information Assurance Page 5 of 5
Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design
Online Social Networks As Supporting Evidence: A Digital Forensic Investigation Model and Its Application Design Norulzahrah Mohd Zainudin, Madjid Merabti, David Llewellyn-Jones School of Computing and
More information2 LEADING IN THE NEW IN PUBLIC SAFETY
Disruption is creating a new operating environment for public safety agencies: new threats, a need to identify, risk and harm from volume, meet increasing citizen expectation, to create new ecosystems,
More informationTHE VERY BRIEF HISTORY OF DIGITAL. Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC
THE VERY BRIEF HISTORY OF DIGITAL EVIDENCE STANDARDS Mark M. Pollitt Regional Computer Forensic Laboratory Program, Federal Bureau of Investigation Washington, DC Abstract: Key words: This paper will trace
More informationTo Revisit: What is Forensic Computing?
To Revisit: What is Forensic Computing? MATHEW HANNAN Researcher University of South Australia, Adelaide, South Australia mathew.hannan@unisa.edu.au +61883029047 PhD Candidate University of Tasmanian,
More informationUK Research and Innovation. Counter Fraud and Bribery Policy
UK Research and Innovation Counter Fraud and Bribery Policy Contents: Policy Statement 1. Introduction and Purpose Endorsement 2. Policy Review 3. Principles - What are Fraud, Bribery and Cybercrime 4.
More informationBats and the Law An overview for planning, building and maintenance works
Bats and the Law An overview for planning, building and maintenance works Bats and their roosts are legally protected. In most cases works can take place as long as you plan ahead and follow certain rules.
More informationContact with the media
Contact with the media Support for survivors of sexual offences How we can help and about this guidance We are the Independent Press Standards Organisation (IPSO), the independent regulator of most of
More informationONR Strategy 2015 to 2020
Title of publication ONR Strategy 2015 to 2020 Office for Nuclear Regulation Page 1 of 5 Introduction Nick Baldwin, Chair The Energy Act 2013 provided for the creation of ONR as an independent, statutory
More informationAnonymous registration: Supporting survivors of domestic abuse to register to vote
Anonymous registration: Supporting survivors of domestic abuse to register to vote April 2018 Produced in partnership between the Electoral Commission and Scottish Women s Aid This leaflet reflects the
More information1. Redistributions of documents, or parts of documents, must retain the SWGIT cover page containing the disclaimer.
Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,
More informationHealth & Safety Policy Statement
Health & Safety Policy Statement NHS Portsmouth Clinical Commissioning Group (CCG) attaches great importance to the Health and Safety of its staff, and recognises its legal obligations under the Health
More information19 and 20 November 2018 RC-4/DG.4 15 November 2018 Original: ENGLISH NOTE BY THE DIRECTOR-GENERAL
OPCW Conference of the States Parties Twenty-Third Session C-23/DG.16 19 and 20 November 2018 15 November 2018 Original: ENGLISH NOTE BY THE DIRECTOR-GENERAL REPORT ON PROPOSALS AND OPTIONS PURSUANT TO
More informationWise Up to Counterfeiting
Wise Up to Counterfeiting A GUIDE FOR POLICE OFFICERS www.bankofcanada.ca/banknotes With the introduction of polymer bank notes in 2011, the Bank of Canada s message is clear it intends to stay ahead of
More informationResearch and Innovation. Roadmap
Research and Innovation Roadmap 2017-2020 About NIFS The National Institute of Forensic Science (NIFS) is a directorate within the Australia New Zealand Policing Advisory Agency (ANZPAA). Our strategic
More informationI also want to thank you, Jack, and everyone for the significant contributions you make every day to NGA s success.
Letitia A. Long Director, National Geospatial-Intelligence Agency Esri Federal GIS Conference Washington Convention Center, Washington, DC February 11, 2014, 0945-1015 (20-25 min keynote, 5-10 min Q&A
More informationRESEARCH AND INNOVATION STRATEGY. ANZPAA National Institute of Forensic Science
RESEARCH AND INNOVATION STRATEGY ANZPAA National Institute of Forensic Science 2017-2020 0 CONTENTS INTRODUCTION... 3 PURPOSE... 4 STRATEGY FOUNDATION... 5 NEW METHODS AND TECHNOLOGY... 5 ESTABLISHED METHODS
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2016 2017 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationOMCL Network of the Council of Europe GENERAL DOCUMENT
OMCL Network of the Council of Europe GENERAL DOCUMENT PA/PH/OMCL (09) 87 4R OMCL Network support for the implementation of the CoE MEDICRIME Convention Full document title and reference How the OMCL Network
More informationJustice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland
Justice Sub-Committee on Policing Police Scotland s digital data and ICT strategy Written submission from Police Scotland The following information is provided for information of the Justice Sub-Committee.
More informationUnit 2: THE CRIME SCENE
Unit 2: THE CRIME SCENE Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it. A. Conan Doyle, in The Boscombe Valley Mystery, 1892 CORPUS
More informationIntroduction and Use of this Text List of Contributors About the Companion Website. PART I Crime Scene Principles 1
Introduction and Use of this Text List of Contributors About the Companion Website PART I Crime Scene Principles 1 1 The Crime Scene Context 3 Raul Sutton 1.1 Introduction 3 1.2 What is a crime? 4 1.3
More informationCrime Scene Management: Scene Specific Methods
Brochure More information from http://www.researchandmarkets.com/reports/992036/ Crime Scene Management: Scene Specific Methods Description: Crime Scene Management: Scene Specific Methods is an accessible
More informationRobert J. Cleary. Proskauer.com. Partner. New York
Contact Robert J. Cleary Partner New York +1.212.969.3340 rjcleary@proskauer.com Bob Cleary is the immediate past co-chair of Proskauer s Litigation Department, a former member of the Firm s Executive
More informationCriminal CV Overview. Clerks Details. Education. Beyond the Bar. Call 1994
Sean Smith Call 1994 Clerks Details Kate Heald 0113 203 1983 Ian Spencer 0113 203 1971 Education Nottingham Trent University (1989 1993) - Bachelor of Laws (LL.B.), 2:1 The College of Law, London (1993
More informationEthics and technology
Professional accountants the future: Ethics and technology International Ethics Standards Board for Accountants (IESBA) 19 June 2018 Agenda ACCA Professional Insights (PI) and technology Technology impact
More informationOur Corporate Strategy Digital
Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital
More informationInternational Forensic Services
International Forensic Services Right People. Delivering Results. Experienced scientists delivering forensic effectiveness, unquestionable integrity, focused customer service and value for money. Strengthening
More informationAustralia and the European Union: an agenda for cooperation
Australia and the European Union: an agenda for cooperation Australia and the European Union: an agenda for future cooperation The 1997 Joint Declaration on Relations between Australia and the European
More informationDIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES
DIGITAL TRANSFORMATION LESSONS LEARNED FROM EARLY INITIATIVES Produced by Sponsored by JUNE 2016 Contents Introduction.... 3 Key findings.... 4 1 Broad diversity of current projects and maturity levels
More informationMedia Literacy Policy
Media Literacy Policy ACCESS DEMOCRATIC PARTICIPATE www.bai.ie Media literacy is the key to empowering people with the skills and knowledge to understand how media works in this changing environment PUBLIC
More informationThis version has been archived. Find the current version at on the Current Documents page. Scientific Working Groups on.
Scientific Working Groups on Digital Evidence and Imaging Technology SWGDE/SWGIT Guidelines & Recommendations for Training in Digital & Multimedia Evidence Disclaimer: As a condition to the use of this
More informationTHE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK
THE NEED FOR DIGITAL FORENSIC INVESTIGATIVE FRAMEWORK I. Ademu 1, C. Imafidon 2 1 Postgraduate Student, School of Architecture, Computing and Engineering, University of East London, London, United Kingdom,
More informationMCPI Annual Conference Tuesday, September 19, 2017
Michigan Council of Professional Investigators MCPI Annual Conference Tuesday, September 19, 2017 Location: Cleary University, 3750 Cleary Drive, Howell, MI 48843 Time 8:45am 9:00am 9:00am 9:45am 9:45am
More informationThe Nagoya Protocol: Compliance. Implications of the E.U. law for Microbiologists
The Nagoya Protocol: Compliance Implications of the E.U. law for Microbiologists 1 Nagoya Protocol Compliance In this talk I will outline: The role of compliance How developed countries will respond The
More informationA DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS
A DIGITAL FORENSIC INVESTIGATIVE MODEL FOR BUSINESS ORGANISATIONS Jock Forrester and Barry Irwin (CISSP) SNRG Department of Computer Science Hamilton Building, Rhodes University, Grahamstown, 6139 Email:
More informationHow to complete the Tier 4 (General) Student visa application online
How to complete the Tier 4 (General) Student visa application online Have you attended a Preparing your Tier 4 visa application presentation hosted each month by the International Support Team? It explains
More informationOver the 10-year span of this strategy, priorities will be identified under each area of focus through successive annual planning cycles.
Contents Preface... 3 Purpose... 4 Vision... 5 The Records building the archives of Canadians for Canadians, and for the world... 5 The People engaging all with an interest in archives... 6 The Capacity
More informationEUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC)
Strasbourg, 10 March 2019 EUROPEAN COMMITTEE ON CRIME PROBLEMS (CDPC) Working Group of Experts on Artificial Intelligence and Criminal Law WORKING PAPER II 1 st meeting, Paris, 27 March 2019 Document prepared
More informationAustralian Census 2016 and Privacy Impact Assessment (PIA)
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,
More informationRe: Examination Guideline: Patentability of Inventions involving Computer Programs
Lumley House 3-11 Hunter Street PO Box 1925 Wellington 6001 New Zealand Tel: 04 496-6555 Fax: 04 496-6550 www.businessnz.org.nz 14 March 2011 Computer Program Examination Guidelines Ministry of Economic
More informationOffice for Nuclear Regulation Strategy
Office for Nuclear Regulation Strategy 2015 to 2020 Office for Nuclear Regulation page 1 of 12 Office for Nuclear Regulation page 2 of 12 Office for Nuclear Regulation Strategy 2015 to 2020 Presented to
More informationLast week a long-time friend asked what type of law I practice. I was surprised that he didn t know what I do for a
Hello, everyone, and welcome to my first ever office newsletter. As you can tell, I studied law and not graphic design, but hopefully you will still find the information in this message to be helpful!
More informationChallenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview
Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The
More informationReport to Congress regarding the Terrorism Information Awareness Program
Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003
More informationCCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy
CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Safeguarding Policy Data Protection Policy Review Date May 2019 Our Mission To provide the very best
More informationINQUESTS A FACTSHEET FOR FAMILIES
INQUESTS A FACTSHEET FOR FAMILIES This is a brief introduction as to what to expect at an Inquest and designed to give an overview about the purpose and process of a Coroner's Inquest. More detailed information
More informationARAMINTA FREEDOM INITIATIVE
ARAMINTA FREEDOM INITIATIVE Volunteer Memorandum of Understanding Dear Araminta Freedom Initiative Volunteer, On behalf of the leadership of Araminta Freedom Initiative, we want to welcome you as one of
More informationMILITARY RADAR TRENDS AND ANALYSIS REPORT
MILITARY RADAR TRENDS AND ANALYSIS REPORT 2016 CONTENTS About the research 3 Analysis of factors driving innovation and demand 4 Overview of challenges for R&D and implementation of new radar 7 Analysis
More informationCCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy
CCTV Policy Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Safeguarding Policy Data Protection Policy Located: T:Drive Review Date May 2019 Our Mission To provide the
More informationIP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018
ANNUAL WORK PLAN FOR 2018 IP KEY SOUTH EAST ASIA ANNUAL WORK PLAN FOR 2018 IP Key South East Asia is an EU Project designed to support the Free Trade Agreement (FTA) talks and Intellectual Property Dialogues
More informationCSCM World Congress on CBRNe Science and Consequence Management. Remarks by Ahmet Üzümcü, Director-General OPCW. Monday 2 June 2014 Tbilisi, Georgia
1 CSCM World Congress on CBRNe Science and Consequence Management Remarks by Ahmet Üzümcü, Director-General OPCW Monday 2 June 2014 Tbilisi, Georgia H.E. the Minister of Internal Affairs, H.E. the Minister
More informationThe creation of the Emergency Preparedness and Response Expert Group (EPREG) which held its second meeting last month.
Remarks at SENIOR REGULATORS MEETING 19 September 2013 Good morning, Ladies and Gentlemen. I am pleased to welcome you to this meeting of Senior Regulators, which is an annual feature of the IAEA General
More informationPRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT PRIVACY IMPACT ASSESSMENT The template below is designed to assist you in carrying out a privacy impact assessment (PIA). Privacy Impact Assessment screening questions These questions
More informationGender pay gap reporting tight for time
People Advisory Services Gender pay gap reporting tight for time March 2018 Contents Introduction 01 Insights into emerging market practice 02 Timing of reporting 02 What do employers tell us about their
More informationDEVON & CORNWALL C O N S T A B U L A R Y
DEVON & CORNWALL C O N S T A B U L A R Y Force Policy & Procedure Guideline EVIDENTIAL DIGITAL IMAGING Reference Number D296 Policy Version Date 17 November 2010 Review Date 01 April 2015 Policy Ownership
More informationIN THE CIRCUIT COURT OF THE ELEVENTH JUDICIAL CIRCUIT IN AND FOR MIAMI-DADE COUNTY, FLORIDA AFFIDAVIT IN SUPPORT OF ARREST WARRANT
IN THE CIRCUIT COURT OF THE ELEVENTH JUDICIAL CIRCUIT IN AND FOR MIAMI-DADE COUNTY, FLORIDA IN RE: APPLICATION FOR ARREST WARRANT FOR: KARL BLAINE ALDERMAN AFFIDAVIT IN SUPPORT OF ARREST WARRANT BEFORE
More informationFALSE PROMISE. That high-value prospect could be a synthetic identity
FALSE PROMISE That high-value prospect could be a synthetic identity An abstract from the LexisNexis Risk Solutions 2018 State of Risk in Communications, Mobile & Media YOU KNOW WHAT YOU'RE UP AGAINST
More informationTHE USE OF A SAFETY CASE APPROACH TO SUPPORT DECISION MAKING IN DESIGN
THE USE OF A SAFETY CASE APPROACH TO SUPPORT DECISION MAKING IN DESIGN W.A.T. Alder and J. Perkins Binnie Black and Veatch, Redhill, UK In many of the high hazard industries the safety case and safety
More informationthe Companies and Intellectual Property Commission of South Africa (CIPC)
organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the
More informationSTEVE TARANI PROFESSIONAL EDUCATION PRESENTATION TOPICS
Active Shooter Management It s now part of our reality that we must consider what to do if we were to be caught in an active shooter event. Although knowing how to run, hide or fight might be quite useful
More informationTECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES
TECHNOLOGY FOR HUMAN TRAFFICKING & SEXUAL EXPLOITATION TRACE PROJECT FINDINGS & RECENT UPDATES Trilateral Research Ltd. Crown House 72 Hammersmith Road W14 8TH, London + 44 (0)20 7559 3550 @Trilateral_UK
More informationThe Internet of Things And what it mean for librarians
The Internet of Things And what it mean for librarians Lee Rainie Pew Research Center Internet Project Presented to: Internet Librarian October 28, 2014 Oxford English Dictionary Internet of things: Development
More informationThe future of the legal profession survey
The future of the legal profession survey conducted by AIJA in collaboration with the Council of Bars and Law Societies in Europe, September October 2018 Contents Methodology Executive summary Top findings
More informationStandards in. International Trade & Nuclear Safety. The Role of IAEA
The Role of Standards in International Trade & Nuclear Safety IAEA International Atomic Energy Agency International Atomic Energy Agency Technical Meeting on Shared Experiences and Lessons Learned from
More informationAnti cheating guidelines for Arbiters
Annex 19B Anti cheating guidelines for Arbiters (These guidelines shall be included in the subjects and will be taught in all Workshops, FIDE Arbiters Seminars and Courses for International and FIDE Arbiters).
More informationNotes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.
Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit
More informationDeveloping the Arts in Ireland. Arts Council Strategic Overview
Developing the Arts in Ireland Arts Council Strategic Overview 2011 2013 1 Mission Statement The mission of the Arts Council is to develop the arts by supporting artists of all disciplines to make work
More informationPrivacy Impact Assessment on use of CCTV
Appendix 2 Privacy Impact Assessment on use of CCTV CCTV is currently in the majority of the Council s leisure facilities, however this needs to be extended to areas not currently covered by CCTV. Background
More informationImage: alexaldo. Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546. In association with:
Image: alexaldo Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546 In association with: Report The role of digital technology in tackling modern slavery
More informationIN THE CIRCUIT COURT OF THE SEVENTEENTH JUDICIAL CIRCUIT IN AND FOR BROWARD COUNTY, FLORIDA
IN THE CIRCUIT COURT OF THE SEVENTEENTH JUDICIAL CIRCUIT IN AND FOR BROWARD COUNTY, FLORIDA AFFIDAVIT IN SUPPORT OF ARREST WARRANT BEFORE ME,, Judge of the Circuit Court, in and for Broward County, Florida,
More informationFor consideration at the Executive Committee meeting on 6 June 2016.
Paper Number T(16)40 18 May 2016 PAPER CLASSIFICATION: OPEN Board of Trustees GIFTS AND HOSPITALITY POLICY VOLUNTEERS (Paper by Dom Pickersgill, General Counsel. If you have any questions on this paper
More informationCOMBINED STORY PLAN FOR A 4-ACT COZY MYSTERY
Page 1 of 8 COMBINED STORY PLAN FOR A 4-ACT COZY MYSTERY ACT ONE Steps 1 to 4 Step 1. Characters and world building. Introduce the main characters in their story worlds and situations. Start with the sleuth
More informationDigital Forensics Lecture 11. Evidence, Reporting, and Action
Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next
More informationPwC s Global Economic Crime Survey 2018: UK findings
PwC s Global Economic Crime Survey 2018: UK findings Pulling fraud out of the shadows www.pwc.co.uk/gecs Welcome to the UK results from our 2018 Global Economic Crime Survey (GECS). The findings from this
More informationThe Port Marine Safety Code a Harbour Masters Perspective!
The Port Marine Safety Code a Harbour Masters Perspective! A PRESENTATION FOR THE PIANC PORT OPERATIONS SEMINAR, LONDON, 25 TH NOVEMBER 2016 CAPTAIN KEVIN RICHARDSON PRESIDENT INTERNATIONAL HARBOUR MASTERS
More informationCase Study: Patent Attorney - Grahame
Case Study: Patent Attorney - Grahame What do you do? Well, as a patent attorney, I provide a sort of bridge between the technical community and the legal community. I have both qualifications, so if somebody
More informationEmerging Security Challenges Division NATO
NATO Science for Peace and Security (SPS) Programme Workshop on CBRN Defence 22-24 October 2013 Brussels Emerging Security Challenges Division NATO 1 NATO Science for Peace and Security (SPS) Programme
More informationVirtual Crime: Forensic Artefacts from Second Life
Virtual Crime: Forensic Artefacts from Second Life Sarah Morris Centre for Forensic Computing, Cranfield University, Shrivenham, SN6 8LA S.L.Morris@Cranfield.ac.uk Abstract Second Life is an online virtual
More informationGLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT
GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT CRITICAL THINKING AT THE CRITICAL TIME ABOUT US The Global Risk and Investigations Practice (GRIP) of FTI Consulting is the leading provider of
More informationThe Disappearing Computer. Information Document, IST Call for proposals, February 2000.
The Disappearing Computer Information Document, IST Call for proposals, February 2000. Mission Statement To see how information technology can be diffused into everyday objects and settings, and to see
More informationConsultation Paper on Public Safety Radio Interoperability Guidelines
June 2006 Spectrum Management and Telecommunications Consultation Paper on Public Safety Radio Interoperability Guidelines Aussi disponible en français Department of Industry Radiocommunication Act Notice
More informationCommittee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection
European Parliament 2014-2019 Committee on the Internal Market and Consumer Protection 2018/2088(INI) 7.12.2018 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee
More informationBecome a Private Investigator
Get paid to investigate! FabJob Guide to Become a Private Investigator Jennifer James Visit www.fabjob.com Contents About The Authors and Experts...8 1. Introduction...11 1.1 Benefits of the Career...12
More informationCOGNITIVE APPROACHES FOR DIGITAL FORENSIC READINESS PLANNING
Chapter 4 COGNITIVE APPROACHES FOR DIGITAL FORENSIC READINESS PLANNING Antonio Pooe and Les Labuschagne Abstract This paper focuses on the use of cognitive approaches for digital forensic readiness planning.
More informationTowards Solving the Identity Challenge Faced by Digital Forensics
Towards Solving the Identity Challenge Faced by Digital Forensics A. Valjarevic and H. Venter Department of Computer Science, University of Pretoria e-mail: alexander@vlatacom.com Abstract The importance
More informationCircuit Programme Handbook
Circuit Programme Handbook Contents p.3 Introduction p.4 Circuit Values and Aims Circuit team p.5 Circuit Evaluation Circuit Governance Circuit Reporting p.6 Circuit Marketing and Press Circuit Brand p.7
More informationFootwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film
Steve Everist, King County Sheriff s Office, WA William Fluit, Sioux Falls Police Department, SD Forensic Photography III, Michael Brooks, January 29, 2007 Footwear & Tire Tread Photography A comparison
More information800 System Procedures
Emergency Button Activation: 800 System Procedures All ACFR radios are equipped with emergency button functionality. When this button is activated by the end-user, an audible alarm and a flashing visual
More informationDIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE
DIGITAL FORENSICS: A MULTI-DIMENSIONAL DISCIPLINE CP Grobler, Prof B Louwrens University of Johannesburg, Department of Business IT Nedbank, SA talania@uj.ac.za 011 406 3551 buksl@nedbank.co.za 011 294
More informationHandling Digital Photographs for Use in Criminal Trials V2, March 2008
Handling Digital Photographs for Use in Criminal Trials V2, March 2008 This is a DRAFT guide that may, once fully developed, be used by law enforcement to help ensure that digital photographs are admissible
More informationEnforcement of Intellectual Property Rights Frequently Asked Questions
EUROPEAN COMMISSION MEMO Brussels/Strasbourg, 1 July 2014 Enforcement of Intellectual Property Rights Frequently Asked Questions See also IP/14/760 I. EU Action Plan on enforcement of Intellectual Property
More informationWritten response to the public consultation on the European Commission Green Paper: From
EABIS THE ACADEMY OF BUSINESS IN SOCIETY POSITION PAPER: THE EUROPEAN UNION S COMMON STRATEGIC FRAMEWORK FOR FUTURE RESEARCH AND INNOVATION FUNDING Written response to the public consultation on the European
More informationAt the Crime Scene. FORENSIC SCIENCE - BURKS Crime Scene
FORENSIC SCIENCE - BURKS Crime Scene At the Crime Scene Forensic science begins at the crime scene, which can provide useful information that must be carefully, systematically, scientifically, and legally
More informationGlobal Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016
Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in
More informationA Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics
A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.
More informationThe Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation
The Method Toolbox of TA PACITA Summer School 2014 Marie Louise Jørgensen, mlj@tekno.dk The Danish Board of Technology Foundation The TA toolbox Method Toolbox Classes of methods Classic or scientific
More informationTechnology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets
CASE STUDY Technology forecasting used in European Commission's policy designs is enhanced with Scopus and LexisNexis datasets EXECUTIVE SUMMARY The Joint Research Centre (JRC) is the European Commission's
More informationChapter 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT. 1. Introduction. Albert Antwi-Boasiako and Hein Venter
Chapter 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT Albert AntwiBoasiako and Hein Venter Abstract Digital evidence is increasingly important in legal proceedings as a result of advances in
More informationDIGITAL FORENSICS LABORATORY
DIGITAL FORENSICS LABORATORY What is digital forensics? First and foremost, you should know that digital data today can be important clue or evidence to support crime investigation or litigation. Digital
More informationTETRA and Critical Communications Association (TCCA) response to Ofcom 700 MHz consultation
TETRA + Critical Communications Association 14 Blandford Square Newcastle upon Tyne NE1 4HZ UK Tel: +44 191 231 4328 Fax: +44 191 245 3802 5th July 2013 Dear Sirs, TETRA and Critical Communications Association
More information